Business Email Compromise (BEC) scams are expected to explode in volume and profitability as attacks bypass traditional safeguards. Research on trends and tactics in BEC attacks, including variants, target victims, and precursor channels. Published March 2023.
Examines the investment priorities for cybersecurity by CISOs and CIOs in 2023, covering priorities to improve overall posture and a specific focus on four investment areas (apps, cloud, data, and on-premises infrastructure). Sponsored by BlackFog, Cerby, OpenText Cybersecurity, Quest, and SonicWall.
Presents new findings that explore the changing threat landscape for email, web, and cloud apps, and what organizations must do to bolster security protections for these channels. Commissioned by Perception Point.
Results of a market survey on the adoption of multi-cloud platforms and the implications for identity and access management. Commissioned by Strata Identity.
Results of a market survey of security managers at organizations in the United States and United Kingdom using Microsoft 365 about phishing, business email compromise, and ransomware attacks. Commissioned by Cyren.
Zero trust offers a modern approach for security to meet modern work designs and tackle the cybersecurity challenges facing organizations. This research explores how organizations are deploying and planning to deploy a zero trust architecture. Sponsored by Archive360, BIO-key International, Progress MOVEit, SonicWall, and Symmetry Systems.
Preventing data exfiltration remains a weakness for many organizations, despite having a complex set of cybersecurity tools already, including data loss prevention (DLP) solutions. A new approach is needed to stop the threat and consequential damage of data exfiltration. In this white paper, we report on a survey on data exfiltration and introduce the category of Anti Data Exfiltration (ADX) cybersecurity solutions. Commissioned by BlackFog.
Michael Osterman interviews Robert Fleming of Blacksquare Technologies on issues related to security, data breaches, and whether or not you can ever know that an attacker is finally gone. Robert also provides some recommendations for decision makers about how best to deal with network security.
Key data points on information security and data breaches. Results from a survey conducted by Osterman Research. An infographic.